Comment on Fake ‘One Battle After Another’ torrent hides malware in subtitles
someguy3@lemmy.world 2 days ago
When the CD shortcut is executed, it launches Windows commands that extract and run a malicious PowerShell script embedded in the subtitle file between lines 100 and 103.
This PowerShell script will then extract numerous AES-encrypted data blocks from the subtitles file again to reconstruct five PowerShell scripts that are dropped to ‘C:\Users<USER>\AppData\Local\Microsoft\Diagnostics.’
The extracted PowerShell scripts act as a malware dropper, performing the following actions on the host:
…
RunJun@lemmy.dbzer0.com 2 days ago
Very interesting. Since I left windows, this isn’t an issue for me but I will be more aware that this can happen now.
FlexibleToast@lemmy.world 2 days ago
Kind of makes me want to install Clam AV just to watch for viruses I wouldn’t otherwise know about because I’m using Linux everywhere.
frongt@lemmy.zip 2 days ago
I did that for a while. It didn’t find any. I think because there weren’t any to find.
Decq@lemmy.world 2 days ago
There isn’t really anything new to learn here. It’s still the same old, don’t run an executable to watch a movie. That the code is partly hidden in the srt/jpg is just a minor implementation detail.